8.8
CWE
352
Advisory Published
Updated

CVE-2016-8673: CSRF

First published: Wed Nov 23 2016(Updated: )

A vulnerability has been identified in SIMATIC CP 343-1 Advanced (incl. SIPLUS NET variant) (All versions < V3.0.53), SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variant) (All versions < V3.2.17), SIMATIC S7-300 PN/DP CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP CPU family (incl. SIPLUS variants) (All versions). The integrated web server at port 80/TCP or port 443/TCP of the affected devices could allow remote attackers to perform actions with the permissions of an authenticated user, provided the targeted user has an active session and is induced to trigger the malicious request.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Siemens SIMATIC S7-300 CPU
Siemens SIMATIC S7-300 CPU
Siemens Simatic CP 443-1
Siemens Simatic CP443-1
Siemens Simatic CP 343-1
Siemens Simatic CP 343-1 Advanced
Siemens SIMATIC S7-400 CPU
Siemens SIMATIC S7-400 CPU

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-8673?

    CVE-2016-8673 has a high severity rating due to the potential for unauthorized access to sensitive information in affected Siemens devices.

  • How do I fix CVE-2016-8673?

    To remediate CVE-2016-8673, update the firmware of affected devices to the latest versions specified by Siemens.

  • Which Siemens devices are affected by CVE-2016-8673?

    CVE-2016-8673 affects various Siemens devices, including SIMATIC CP 343-1 Advanced and SIMATIC S7-300 PN/DP CPU family among others.

  • What are the consequences of CVE-2016-8673 exploitation?

    Exploitation of CVE-2016-8673 may lead to unauthorized control or manipulation of devices, resulting in operational disruptions.

  • Is there a delay in patching CVE-2016-8673 needed?

    Timely patching is crucial for CVE-2016-8673 to minimize the risk of exploitation, as delaying may leave systems vulnerable.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203